Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3855303ybi; Mon, 27 May 2019 07:09:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqwTgefYgF+6ju3O46BRjOueCYhaPTpbkTCjTF5njFpKbyRboPt9kb1i1uAnlDCKARSpyuKt X-Received: by 2002:a65:6088:: with SMTP id t8mr77320789pgu.381.1558966197796; Mon, 27 May 2019 07:09:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558966197; cv=none; d=google.com; s=arc-20160816; b=H7tr2Ju5y3E6DIkZ5oPRvEzWqUIatLxh38ZsHvh8AphcZPrFUO7Tusk5cIgpegNjSf 4YEbvHeErBqGFhQt9gQDQz+eFJg+0snqAQZzdFCRD/mkeKDhClzz4PLLPYfnsrRmDvVb 8smlbp526QO9xbZN08VJlcsaHj3mSPxVSAiZ//h7xfXMri646Ebrqldz+EGoD8QG3FvZ O/W2j35tmSm/4EB8nZsB1iSPgDeNBqCvs9cukxcK7HtZFrfthTzSfJiY7PNzUXvMeTQy tCvFrXVRa/tI5RRem7gF6R5AV6LUuSVFx/y83sHrIv9ZJS1JKoFDFsjVbTxJJfDwJIh3 XVzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=tIjGXLepcbGZMR+8qiYaDJ3Gr227s/ReVA8VLW2O6L8=; b=Uf9rOyGRXuahZYmJp36f/+E9vspsqS3eesPnNwbICDo2z9mseHnVuEHDkHSNlTpSfa qSXS4EHnPbDEbs+fxMG3HFN6eR+RBAEh0DIdS0b6mTgydpi9S6SsdGCEjdFMCH/WW3nH 8hFTYGCG9KDaLQDqHmkJnwUUkOsw6+Y6GtpCaa+zgeY1ggfllzRdqgqBON2W1aCVhUck QruiwXy/qIK/rf33jqL32Wtl1wQGyhu0P0GIUAzd8BK5I0T1oCoiO9h1MXkVoQM43KvN c/ae1ldAbKsVs+yqSHhXFPZZFBsmXpDfXa7ClDbFIZH26eBQ/rY+Z2AKaxypODe945mh k4lg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LFXt2i+K; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s7si15589702pji.107.2019.05.27.07.09.29; Mon, 27 May 2019 07:09:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LFXt2i+K; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726175AbfE0OJZ (ORCPT + 99 others); Mon, 27 May 2019 10:09:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:43222 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726114AbfE0OJY (ORCPT ); Mon, 27 May 2019 10:09:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DEA32205ED; Mon, 27 May 2019 14:09:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558966164; bh=gQ1P5ZYDjSIagUaavAIvJRBf/cNBRCRL3jw2f07583Y=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=LFXt2i+KmO9X8HVMBvlyNZ3Xe7GUSMY8N8WvQVg8fs7nx9DItEQZsYdOiPtTQ9wa3 UWQAKIieYUnzW/afKH6st0B1QFV9Li+Vuyxrd175Tk6duP6IluA7F1p1nWfmLeLVkA N/g5tqXbfwj5HIbbV1TGM1gE9xK3KGNRPHvmKzHA= Date: Mon, 27 May 2019 16:09:21 +0200 From: Greg KH To: Yu Xu Cc: kolga@netapp.com, linux-nfs@vger.kernel.org, joseph.qi@linux.alibaba.com, caspar@linux.alibaba.com Subject: Re: [backport request][stable] NFSv4.x: fix incorrect return value in copy_file_range Message-ID: <20190527140921.GD7659@kroah.com> References: <0f0e59bd-2520-e265-265e-4a29bf776c60@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0f0e59bd-2520-e265-265e-4a29bf776c60@linux.alibaba.com> User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, May 23, 2019 at 11:59:30PM +0800, Yu Xu wrote: > Hi, > > I'm using kernel v4.19.y and find that v4.19.y fails in the latest xfstests > generic/075, 091, 112, 127 and 263, which can be simply reproduced as > follows: > > # kernel 4.19.y > $ xfs_io -fc "copy_range -s 0 -d 1 -l 1 /mnt/nfs/file" /mnt/nfs/file > copy_range: Invalid argument > > # kernel 5.1.0 > $ xfs_io -fc "copy_range -s 0 -d 1 -l 1 /mnt/nfs/file" /mnt/nfs/file > # success > > I notice that upstream (v5.1+) has already fixed this issue with: > 1) commit 45ac486ecf2dc998e25cf32f0cabf2deaad875be > 2) commit 0769663b4f580566ef6cdf366f3073dbe8022c39 > > But these patches do not cc stable@vger.kernel.org (why? forgotten?). And > will v4.19.y consider to backport these patches? I will be glad to queue them up now, thanks for letting me know. greg k-h